Hacking

Pierluigi Paganini October 06, 2014
Europol warning on the risks related to the Internet of Everything (IoE)

The European Police Office (Europol) confirmed that difficulties to face the menaces of cybercrimes to the Internet of Everything (IoE). The EU’s chief criminal intelligence agency made a disconcerting revelation, the threat of “online murder” is set to rise. It isn’t a science movie trailer, but the finding that cyber criminals increasingly targeting victims with internet […]

Pierluigi Paganini October 06, 2014
ATM hacking easily with RM100 chip and a free malware

Cybercrime expert explains anyone with technical knowledge, a malware and the help of an insider could easily hack an ATM machine. A RM100 chip, specific technical knowledge and a free malware obtained over the Internet is all the necessary to hack Automated Teller Machines (ATMs), this is the opinion of a cybercrime expert, which released an exclusive […]

Pierluigi Paganini October 05, 2014
Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been shocked by the discovery of the Bash Bug flaw, a vulnerability that was present in the popular Bash component for more than two decades. While principal […]

Pierluigi Paganini October 05, 2014
War shipping, hacking corporate WLan with a Raspberry Pi board

Security expert Larry Pesce has designed a war shipping board-sized package that could be used to hack wireless networks through the post. The corporate espionage is considered one of the most dangerous threats for private business, but also for government entities, we have discussed in the past about various kinds of offensives against targeted networks, […]

Pierluigi Paganini October 04, 2014
How to transform USB sticks into an undetectable malicious devices

Two researchers Brandon Wilson and Adam Caudill released their attack code to reprogram USB sticks and use them as an undetectable hacking instrument. Recently, two independent researchers, Brandon Wilson and Adam Caudill, have released the code which can reprogram, benign USB devices turning them in malicious components. The experts published the code on the Github raising the question related […]

Pierluigi Paganini October 01, 2014
Flawed iOS 8’s Reset All Settings Option erases iCloud Docs

The MacRumors forum reported a serious flaw in iOS 8’s ‘Reset All Settings’ Option which causes the deletion of iCloud Drive documents. The Fappening case has raised the question about the level of security offered by iCloud and other cloud storage services. Apple was criticized for the way its security experts managed the flaw in iCloud file […]

Pierluigi Paganini October 01, 2014
Ello Social Network knocked down by a cyber attack

Ello, the new social network which is considered the anti-Facebook, was knocked down on Sunday by a distributed denial of service (DDoS) attack. In these days, many articles reported the born of Ello, a new social network considered as a possible antagonist of the giant Facebook. Ello creator considers it as a “tool for empowerment” […]

Pierluigi Paganini September 28, 2014
ShellShock could be used to hack VoIP systems

Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be  exploited to hack Voice over IP systems worldwide. The Shellshock Bash is monopolizing the debate on the Internet security in these days, every vendor is assessing its product to verify the impact of the critical vulnerability Bash Bug (CVE-2014-6271). Apple recently announced that its Mac OS X based […]

Pierluigi Paganini September 27, 2014
The Fappening 3, other nude celebrity photos leaked

A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence and other celebrities. The Fappening is now in its third episode and the celebrities are naked again. The Fappening seems to be never ending story, a new archive of nude celebrity photos has been leaked online. The […]

Pierluigi Paganini September 26, 2014
Hackers target Bash Bug vulnerability in the wild

The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of machines on a large scale. The recently discovered Bash Bug vulnerability, coded as CVE-2014-6271 and known also as “Shellshock,” is worrying the security community due to its impact on a large-scale. The remotely exploitable critical flaw affects Linux, Unix and […]